Data management method and device, electronic equipment and storage medium

A data management and data return technology, applied in the computer field, can solve the problems of inability to provide data and digital enterprise data security, corporate data leakage, personal information insecurity, etc., to ensure data access security, ensure flow security, The effect of preserving integrity

Pending Publication Date: 2022-02-08
SHENZHEN LEXIN SOFTWARE TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, big data information brings together more and more confidential corporate information and personal privacy information. If all data is differentially or anonymously processed, it cannot be accurately protected according to data classification and classification, and corporate data leakage and personal privacy information will occur. Hidden dangers of information insecurity
The sorting of classification and classification in the existing technology generally adopts expert experience and artificial intelligence, etc., and the system of integrated technology is used to complete data sorting, classification and classification, and data security policy implementation, but it cannot be provided to the interconnected industry data and digitization of the open architecture. Enterprise data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data management method and device, electronic equipment and storage medium
  • Data management method and device, electronic equipment and storage medium
  • Data management method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056]The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings but not all structures.

[0057] figure 1 It is a schematic flow chart of the data management method provided by the embodiment of the present invention. The method can be executed by the data management device provided by the embodiment of the present invention, and the device can be implemented by software and / or hardware. In a specific embodiment, the apparatus may be integrated in an electronic device, which may be, for example, a server. The following embodiments will be described by taking the device integrated in electronic equipmen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data management method and device, electronic equipment and a storage medium. The method comprises: receiving a data access request sent by a user side, querying an access database based on the data access request to determine to-be-returned data, and determining a first security policy implemented to the to-be-returned data; determining an access label of the to-be-returned data and an access standard security policy corresponding to the access label according to the field information of the to-be-returned data; determining whether the first security policy is consistent with an access standard security policy; and when the first security policy is inconsistent with the access standard security policy, blocking the current data access, and recording the current abnormal access. According to the embodiment of the invention, the access label of the data is automatically identified by utilizing the enterprise classification and grading rule, the standard security policy required to be implemented by the to-be-returned data is determined by utilizing the access label, and whether the security policy of the to-be-returned data is completely implemented or not is determined according to the standard security policy, so that the security of the data access is ensured, and the integrity of the database is reserved.

Description

technical field [0001] Embodiments of the present invention relate to computer technology, and in particular, to a data management method, device, electronic equipment, and storage medium. Background technique [0002] With the rapid development of network information, big data information spreads rapidly on the network, penetrates into people's production and life, and has a huge impact on all aspects of people's life. However, big data information brings together more and more corporate confidential information and personal privacy information. If all data is differentially or anonymously processed, it cannot be accurately protected according to data classification and classification, and corporate data leakage and personal privacy information will occur. Information security risks. The sorting of classification and grading in the existing technology generally adopts expert experience and artificial intelligence, and uses an integrated technology system to complete data s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/31
CPCG06F21/6218G06F21/602G06F21/6245G06F21/31G06F2221/2141
Inventor 刘志诚
Owner SHENZHEN LEXIN SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products